TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A Docker Abstraction That Handles Container Security

61 pointsby technologyvaultalmost 8 years ago

8 comments

pmontraalmost 8 years ago
I decided to try nanobox last Friday, after some troubles with firing up a Vagrant box on my laptop. One instance worked, another one didn&#x27;t, nothing new...<p>Unfortunately I realized that to download nanobox I have to register and login and I really don&#x27;t understand why. I expected to be able to download a binary, write a configuration file and build my service which I&#x27;ll never run on somebody&#x27;s else cloud.<p>So this is not equivalent to Vagrant or docker, which are unregistered downloads or even apt-gets. It&#x27;s more like running a part of AWS locally in development, but I don&#x27;t want any lockin for this project.<p>I went back to Vagrant. It turned out that a halt of the failed box followed by an up fixed the problem. I still don&#x27;t feel Vagrant to be completely reliable or reproducible but I&#x27;ll write my docker-compose and Dockerfiles if I want to use something else.<p>I&#x27;d love to hear from nanobox about the reasons for the required registration. Not having to support people like me that won&#x27;t buy their service would be perfectly fine. I wonder if there is some technical reason that applies also to the basic scenario of firing up a service locally.
gtirlonialmost 8 years ago
It might be worth investigating Kubernetes network policies [0] and the CIS benchmark [1] for a similar solution.<p>0 - <a href="https:&#x2F;&#x2F;kubernetes.io&#x2F;docs&#x2F;concepts&#x2F;services-networking&#x2F;network-policies&#x2F;" rel="nofollow">https:&#x2F;&#x2F;kubernetes.io&#x2F;docs&#x2F;concepts&#x2F;services-networking&#x2F;netw...</a><p>1 - <a href="https:&#x2F;&#x2F;www.cisecurity.org&#x2F;benchmark&#x2F;kubernetes&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cisecurity.org&#x2F;benchmark&#x2F;kubernetes&#x2F;</a>
评论 #14853003 未加载
评论 #14855291 未加载
评论 #14855293 未加载
caleblloydalmost 8 years ago
From watching the videos on their homepage, it looks to me like the nanobox CLI is a bunch of wrappers around Docker.<p>The cloud product sounds like a custom Docker container orchestrator. Worker nodes run on your cloud provider but management is tied to a control panel on their website. They recommend using nanobox over a PaaS in their video, but I fail to see how this is anything other than a PaaS.
lloyddealmost 8 years ago
Brings to mind Joyent Triton (OSS) which takes the Docker API abstraction at the availability zone (DC) built on (Solaris) Zones which also benefit by Linux Kernel API (SmartOS LX Brand).
contingenciesalmost 8 years ago
It feels like the de-facto network policy design methodology, which I am yet to see implemented in open source, is one in which CI&#x2F;CD test processes observe network utilization in test environments and automatically implement restrictions for deployed instances.<p>For example, and ingress-only static content webserver would not require any outbound internet access.<p>The same approach could and should be used for other observable and manageable layers (filesystem access, syscalls, language interpreter-specific function call whitelisting, etc.).<p>I am waiting for a security-focused CI&#x2F;CD tool to own this space. Even a light touch implementation would surely improve greatly on the status quo.
评论 #14855313 未加载
评论 #14853190 未加载
irishasaurusalmost 8 years ago
Has there been a security audit yet?
评论 #14856816 未加载
the_common_manalmost 8 years ago
How is this different from heroku?
评论 #14877998 未加载
评论 #14853383 未加载
评论 #14853142 未加载
评论 #14853140 未加载
ptsptsalmost 8 years ago
Does Nanobox need root privileges on the host? If not, how does it provide networking?